Enhancing Security in Cloud Computing by Combining Dynamic Broadcast Encryption and Group Signature

2013 ◽  
Vol 1 (2) ◽  
pp. 24-28
Author(s):  
V. Ganesh Karthikeyan ◽  
R.Malar Priya ◽  
R. Kalpana
Author(s):  
K. V. Uma Maheswari ◽  
Dr. Dhanaraj Cheelu

Cloud computing is recognized as an alternative to traditional information technology due to its intrinsic resource sharing and low maintenance characteristics. Cloud computing provides an economical and efficient solution for sharing group resource among cloud users. Unfortunately, when sharing the data in a group while preserving data, identity privacy is still a challenging issue due to frequent change in membership. In overcome this problem, a secure data sharing scheme for dynamic groups is proposed so that any user within a group can share the data in a secure manner by leveraging both the group signature and dynamic broadcast encryption techniques. It should enable any cloud user to anonymously share data with others within the group and support efficient member revocation. The storage overhead and encryption computation cost are dependent on the number of revoked users.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Shuang Yao ◽  
Dawei Zhang

Broadcast encryption scheme enables a sender distribute the confidential content to a certain set of intended recipients. It has been applied in cloud computing, TV broadcasts, and many other scenarios. Inner product broadcast encryption takes merits of both broadcast encryption and inner product encryption. However, it is crucial to reduce the computation cost and to take the recipient’s privacy into consideration in the inner product broadcast encryption scheme. In order to address these problems, we focus on constructing a secure and practical inner product broadcast encryption scheme in this paper. First, we build an anonymous certificate-based inner product broadcast encryption scheme. Especially, we give the concrete construction and security analysis. Second, compared with the existing inner product broadcast encryption schemes, the proposed scheme has an advantage of anonymity. Security proofs show that the proposed scheme achieves confidentiality and anonymity against adaptive chosen-ciphertext attacks. Finally, we implement the proposed anonymous inner product broadcast encryption scheme and evaluate its performance. Test results show that the proposed scheme supports faster decryption operations and has higher efficiency.


2019 ◽  
Vol 24 (2) ◽  
pp. 134-140 ◽  
Author(s):  
Yanyan Yang ◽  
Mingsheng Hu ◽  
Shan Kong ◽  
Bei Gong ◽  
Xinxin Liu

Sign in / Sign up

Export Citation Format

Share Document